mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-22 06:53:01 +00:00
nixos/tests/userborn: init
This commit is contained in:
parent
4620067d79
commit
ad63319ca5
@ -1057,6 +1057,11 @@ in {
|
|||||||
uptime-kuma = handleTest ./uptime-kuma.nix {};
|
uptime-kuma = handleTest ./uptime-kuma.nix {};
|
||||||
urn-timer = handleTest ./urn-timer.nix {};
|
urn-timer = handleTest ./urn-timer.nix {};
|
||||||
usbguard = handleTest ./usbguard.nix {};
|
usbguard = handleTest ./usbguard.nix {};
|
||||||
|
userborn = runTest ./userborn.nix;
|
||||||
|
userborn-mutable-users = runTest ./userborn-mutable-users.nix;
|
||||||
|
userborn-immutable-users = runTest ./userborn-immutable-users.nix;
|
||||||
|
userborn-mutable-etc = runTest ./userborn-mutable-etc.nix;
|
||||||
|
userborn-immutable-etc = runTest ./userborn-immutable-etc.nix;
|
||||||
user-activation-scripts = handleTest ./user-activation-scripts.nix {};
|
user-activation-scripts = handleTest ./user-activation-scripts.nix {};
|
||||||
user-expiry = runTest ./user-expiry.nix;
|
user-expiry = runTest ./user-expiry.nix;
|
||||||
user-home-mode = handleTest ./user-home-mode.nix {};
|
user-home-mode = handleTest ./user-home-mode.nix {};
|
||||||
|
70
nixos/tests/userborn-immutable-etc.nix
Normal file
70
nixos/tests/userborn-immutable-etc.nix
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
{ lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
normaloHashedPassword = "$y$j9T$IEWqhKtWg.r.8fVkSEF56.$iKNxdMC6hOAQRp6eBtYvBk4c7BGpONXeZMqc8I/LM46";
|
||||||
|
|
||||||
|
common = {
|
||||||
|
services.userborn.enable = true;
|
||||||
|
boot.initrd.systemd.enable = true;
|
||||||
|
system.etc.overlay = {
|
||||||
|
enable = true;
|
||||||
|
mutable = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
name = "userborn-immutable-etc";
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ nikstur ];
|
||||||
|
|
||||||
|
nodes.machine =
|
||||||
|
{ config, ... }:
|
||||||
|
{
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users = {
|
||||||
|
users = {
|
||||||
|
normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
hashedPassword = normaloHashedPassword;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
specialisation.new-generation = {
|
||||||
|
inheritParentConfig = false;
|
||||||
|
configuration = {
|
||||||
|
nixpkgs = {
|
||||||
|
inherit (config.nixpkgs) hostPlatform;
|
||||||
|
};
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users.users = {
|
||||||
|
new-normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
machine.wait_for_unit("userborn.service")
|
||||||
|
|
||||||
|
with subtest("normalo user is created"):
|
||||||
|
assert "${normaloHashedPassword}" in machine.succeed("getent shadow normalo"), "normalo user password is not correct"
|
||||||
|
|
||||||
|
|
||||||
|
machine.succeed("/run/current-system/specialisation/new-generation/bin/switch-to-configuration switch")
|
||||||
|
|
||||||
|
|
||||||
|
with subtest("normalo user is disabled"):
|
||||||
|
print(machine.succeed("getent shadow normalo"))
|
||||||
|
assert "!*" in machine.succeed("getent shadow normalo"), "normalo user is not disabled"
|
||||||
|
|
||||||
|
with subtest("new-normalo user is created after switching to new generation"):
|
||||||
|
print(machine.succeed("getent passwd new-normalo"))
|
||||||
|
'';
|
||||||
|
}
|
75
nixos/tests/userborn-immutable-users.nix
Normal file
75
nixos/tests/userborn-immutable-users.nix
Normal file
@ -0,0 +1,75 @@
|
|||||||
|
{ lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
normaloHashedPassword = "$y$j9T$IEWqhKtWg.r.8fVkSEF56.$iKNxdMC6hOAQRp6eBtYvBk4c7BGpONXeZMqc8I/LM46";
|
||||||
|
|
||||||
|
common = {
|
||||||
|
services.userborn.enable = true;
|
||||||
|
users.mutableUsers = false;
|
||||||
|
};
|
||||||
|
in
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
name = "userborn-immutable-users";
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ nikstur ];
|
||||||
|
|
||||||
|
nodes.machine =
|
||||||
|
{ config, ... }:
|
||||||
|
{
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users = {
|
||||||
|
users = {
|
||||||
|
normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
hashedPassword = normaloHashedPassword;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
specialisation.new-generation = {
|
||||||
|
inheritParentConfig = false;
|
||||||
|
configuration = {
|
||||||
|
nixpkgs = {
|
||||||
|
inherit (config.nixpkgs) hostPlatform;
|
||||||
|
};
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users.users = {
|
||||||
|
new-normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
machine.wait_for_unit("userborn.service")
|
||||||
|
|
||||||
|
with subtest("normalo user is created"):
|
||||||
|
assert "${normaloHashedPassword}" in machine.succeed("getent shadow normalo"), "normalo user password is not correct"
|
||||||
|
|
||||||
|
with subtest("Fail to add new user manually"):
|
||||||
|
machine.fail("useradd manual-normalo")
|
||||||
|
|
||||||
|
with subtest("Fail to add delete user manually"):
|
||||||
|
machine.fail("userdel normalo")
|
||||||
|
|
||||||
|
|
||||||
|
machine.succeed("/run/current-system/specialisation/new-generation/bin/switch-to-configuration switch")
|
||||||
|
|
||||||
|
|
||||||
|
with subtest("normalo user is disabled"):
|
||||||
|
print(machine.succeed("getent shadow normalo"))
|
||||||
|
assert "!*" in machine.succeed("getent shadow normalo"), "normalo user is not disabled"
|
||||||
|
|
||||||
|
with subtest("new-normalo user is created after switching to new generation"):
|
||||||
|
print(machine.succeed("getent passwd new-normalo"))
|
||||||
|
|
||||||
|
with subtest("Still fail to add new user manually"):
|
||||||
|
machine.fail("useradd again-normalo")
|
||||||
|
'';
|
||||||
|
}
|
70
nixos/tests/userborn-mutable-etc.nix
Normal file
70
nixos/tests/userborn-mutable-etc.nix
Normal file
@ -0,0 +1,70 @@
|
|||||||
|
{ lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
normaloHashedPassword = "$y$j9T$IEWqhKtWg.r.8fVkSEF56.$iKNxdMC6hOAQRp6eBtYvBk4c7BGpONXeZMqc8I/LM46";
|
||||||
|
|
||||||
|
common = {
|
||||||
|
services.userborn.enable = true;
|
||||||
|
boot.initrd.systemd.enable = true;
|
||||||
|
system.etc.overlay = {
|
||||||
|
enable = true;
|
||||||
|
mutable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
in
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
name = "userborn-mutable-etc";
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ nikstur ];
|
||||||
|
|
||||||
|
nodes.machine =
|
||||||
|
{ config, ... }:
|
||||||
|
{
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users = {
|
||||||
|
users = {
|
||||||
|
normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
hashedPassword = normaloHashedPassword;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
specialisation.new-generation = {
|
||||||
|
inheritParentConfig = false;
|
||||||
|
configuration = {
|
||||||
|
nixpkgs = {
|
||||||
|
inherit (config.nixpkgs) hostPlatform;
|
||||||
|
};
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users.users = {
|
||||||
|
new-normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
machine.wait_for_unit("userborn.service")
|
||||||
|
|
||||||
|
with subtest("normalo user is created"):
|
||||||
|
assert "${normaloHashedPassword}" in machine.succeed("getent shadow normalo"), "normalo user password is not correct"
|
||||||
|
|
||||||
|
|
||||||
|
machine.succeed("/run/current-system/specialisation/new-generation/bin/switch-to-configuration switch")
|
||||||
|
|
||||||
|
|
||||||
|
with subtest("normalo user is disabled"):
|
||||||
|
print(machine.succeed("getent shadow normalo"))
|
||||||
|
assert "!*" in machine.succeed("getent shadow normalo"), "normalo user is not disabled"
|
||||||
|
|
||||||
|
with subtest("new-normalo user is created after switching to new generation"):
|
||||||
|
print(machine.succeed("getent passwd new-normalo"))
|
||||||
|
'';
|
||||||
|
}
|
76
nixos/tests/userborn-mutable-users.nix
Normal file
76
nixos/tests/userborn-mutable-users.nix
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
{ lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
normaloHashedPassword = "$y$j9T$IEWqhKtWg.r.8fVkSEF56.$iKNxdMC6hOAQRp6eBtYvBk4c7BGpONXeZMqc8I/LM46";
|
||||||
|
|
||||||
|
common = {
|
||||||
|
services.userborn.enable = true;
|
||||||
|
users.mutableUsers = true;
|
||||||
|
};
|
||||||
|
in
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
name = "userborn-mutable-users";
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ nikstur ];
|
||||||
|
|
||||||
|
nodes.machine =
|
||||||
|
{ config, ... }:
|
||||||
|
{
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users = {
|
||||||
|
mutableUsers = true;
|
||||||
|
users = {
|
||||||
|
normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
hashedPassword = normaloHashedPassword;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
specialisation.new-generation = {
|
||||||
|
inheritParentConfig = false;
|
||||||
|
configuration = {
|
||||||
|
nixpkgs = {
|
||||||
|
inherit (config.nixpkgs) hostPlatform;
|
||||||
|
};
|
||||||
|
imports = [ common ];
|
||||||
|
|
||||||
|
users.users = {
|
||||||
|
new-normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
machine.wait_for_unit("userborn.service")
|
||||||
|
|
||||||
|
with subtest("normalo user is created"):
|
||||||
|
assert 1000 == int(machine.succeed("id --user normalo")), "normalo user doesn't have UID 1000"
|
||||||
|
assert "${normaloHashedPassword}" in machine.succeed("getent shadow normalo"), "normalo user password is not correct"
|
||||||
|
|
||||||
|
with subtest("Add new user manually"):
|
||||||
|
machine.succeed("useradd manual-normalo")
|
||||||
|
assert 1001 == int(machine.succeed("id --user manual-normalo")), "manual-normalo user doesn't have UID 1001"
|
||||||
|
|
||||||
|
with subtest("Delete manual--normalo user manually"):
|
||||||
|
machine.succeed("userdel manual-normalo")
|
||||||
|
|
||||||
|
|
||||||
|
machine.succeed("/run/current-system/specialisation/new-generation/bin/switch-to-configuration switch")
|
||||||
|
|
||||||
|
|
||||||
|
with subtest("normalo user is disabled"):
|
||||||
|
print(machine.succeed("getent shadow normalo"))
|
||||||
|
assert "!*" in machine.succeed("getent shadow normalo"), "normalo user is not disabled"
|
||||||
|
|
||||||
|
with subtest("new-normalo user is created after switching to new generation"):
|
||||||
|
print(machine.succeed("getent passwd new-normalo"))
|
||||||
|
assert 1001 == int(machine.succeed("id --user new-normalo")), "new-normalo user doesn't have UID 1001"
|
||||||
|
'';
|
||||||
|
}
|
127
nixos/tests/userborn.nix
Normal file
127
nixos/tests/userborn.nix
Normal file
@ -0,0 +1,127 @@
|
|||||||
|
{ lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
# All passwords are "test"
|
||||||
|
rootHashedPasswordFile = "$y$j9T$6ueoTO5y7vvFsGvpQJEEa.$vubxgBiMnkTCtRtPD3hNiZHa7Nm1WsJeE9QomYqSRXB";
|
||||||
|
updatedRootHashedPassword = "$y$j9T$pBCO9N1FRF1rSl6V15n9n/$1JmRLEYPO7TRCx43cvLO19u59WA/oqTEhmSR4wrhzr.";
|
||||||
|
|
||||||
|
normaloPassword = "test";
|
||||||
|
updatedNormaloHashedPassword = "$y$j9T$IEWqhKtWg.r.8fVkSEF56.$iKNxdMC6hOAQRp6eBtYvBk4c7BGpONXeZMqc8I/LM46";
|
||||||
|
|
||||||
|
sysuserInitialHashedPassword = "$y$j9T$Kb6jGrk41hudTZpNjazf11$iw7fZXrewC6JxRaGPz7/gPXDZ.Z1VWsupvy81Hi1XiD";
|
||||||
|
updatedSysuserInitialHashedPassword = "$y$j9T$kUBVhgOdSjymSfwfRVja70$eqCwWzVsz0fI0Uc6JsdD2CYMCpfJcErqnIqva2JCi1D";
|
||||||
|
|
||||||
|
newNormaloHashedPassword = "$y$j9T$UFBMWbGjjVola0YE9YCcV/$jRSi5S6lzkcifbuqjMcyXLTwgOGm9BTQk/G/jYaxroC";
|
||||||
|
in
|
||||||
|
|
||||||
|
{
|
||||||
|
|
||||||
|
name = "userborn";
|
||||||
|
|
||||||
|
meta.maintainers = with lib.maintainers; [ nikstur ];
|
||||||
|
|
||||||
|
nodes.machine = {
|
||||||
|
services.userborn.enable = true;
|
||||||
|
|
||||||
|
# Read this password file at runtime from outside the Nix store.
|
||||||
|
environment.etc."rootpw.secret".text = rootHashedPasswordFile;
|
||||||
|
|
||||||
|
users = {
|
||||||
|
users = {
|
||||||
|
root = {
|
||||||
|
# Override the empty root password set by the test instrumentation.
|
||||||
|
hashedPasswordFile = lib.mkForce "/etc/rootpw.secret";
|
||||||
|
};
|
||||||
|
normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
password = normaloPassword;
|
||||||
|
};
|
||||||
|
sysuser = {
|
||||||
|
isSystemUser = true;
|
||||||
|
group = "sysusers";
|
||||||
|
initialHashedPassword = sysuserInitialHashedPassword;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
groups = {
|
||||||
|
sysusers = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
specialisation.new-generation.configuration = {
|
||||||
|
users = {
|
||||||
|
users = {
|
||||||
|
root = {
|
||||||
|
# Forcing this to null simulates removing the config value in a new
|
||||||
|
# generation.
|
||||||
|
hashedPasswordFile = lib.mkOverride 9 null;
|
||||||
|
hashedPassword = updatedRootHashedPassword;
|
||||||
|
};
|
||||||
|
normalo = {
|
||||||
|
hashedPassword = updatedNormaloHashedPassword;
|
||||||
|
};
|
||||||
|
sysuser = {
|
||||||
|
initialHashedPassword = lib.mkForce updatedSysuserInitialHashedPassword;
|
||||||
|
};
|
||||||
|
new-normalo = {
|
||||||
|
isNormalUser = true;
|
||||||
|
hashedPassword = newNormaloHashedPassword;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
groups = {
|
||||||
|
new-group = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
testScript = ''
|
||||||
|
machine.wait_for_unit("userborn.service")
|
||||||
|
|
||||||
|
with subtest("Correct mode on the password files"):
|
||||||
|
assert machine.succeed("stat -c '%a' /etc/passwd") == "644\n"
|
||||||
|
assert machine.succeed("stat -c '%a' /etc/group") == "644\n"
|
||||||
|
assert machine.succeed("stat -c '%a' /etc/shadow") == "0\n"
|
||||||
|
|
||||||
|
with subtest("root user has correct password"):
|
||||||
|
print(machine.succeed("getent passwd root"))
|
||||||
|
assert "${rootHashedPasswordFile}" in machine.succeed("getent shadow root"), "root user password is not correct"
|
||||||
|
|
||||||
|
with subtest("normalo user is created"):
|
||||||
|
print(machine.succeed("getent passwd normalo"))
|
||||||
|
assert 1000 <= int(machine.succeed("id --user normalo")), "normalo user doesn't have a normal UID"
|
||||||
|
assert machine.succeed("stat -c '%U' /home/normalo") == "normalo\n"
|
||||||
|
|
||||||
|
with subtest("system user is created with correct password"):
|
||||||
|
print(machine.succeed("getent passwd sysuser"))
|
||||||
|
assert 1000 > int(machine.succeed("id --user sysuser")), "sysuser user doesn't have a system UID"
|
||||||
|
assert "${sysuserInitialHashedPassword}" in machine.succeed("getent shadow sysuser"), "system user password is not correct"
|
||||||
|
|
||||||
|
with subtest("sysusers group is created"):
|
||||||
|
print(machine.succeed("getent group sysusers"))
|
||||||
|
|
||||||
|
|
||||||
|
machine.succeed("/run/current-system/specialisation/new-generation/bin/switch-to-configuration switch")
|
||||||
|
|
||||||
|
|
||||||
|
with subtest("root user password is updated"):
|
||||||
|
print(machine.succeed("getent passwd root"))
|
||||||
|
assert "${updatedRootHashedPassword}" in machine.succeed("getent shadow root"), "root user password is not updated"
|
||||||
|
|
||||||
|
with subtest("normalo user password is updated"):
|
||||||
|
print(machine.succeed("getent passwd normalo"))
|
||||||
|
assert "${updatedNormaloHashedPassword}" in machine.succeed("getent shadow normalo"), "normalo user password is not updated"
|
||||||
|
|
||||||
|
with subtest("system user password is NOT updated"):
|
||||||
|
print(machine.succeed("getent passwd sysuser"))
|
||||||
|
assert "${sysuserInitialHashedPassword}" in machine.succeed("getent shadow sysuser"), "sysuser user password is not updated"
|
||||||
|
|
||||||
|
with subtest("new-normalo user is created after switching to new generation"):
|
||||||
|
print(machine.succeed("getent passwd new-normalo"))
|
||||||
|
assert 1000 <= int(machine.succeed("id --user new-normalo")), "new-normalo user doesn't have a normal UID"
|
||||||
|
assert machine.succeed("stat -c '%U' /home/new-normalo") == "new-normalo\n"
|
||||||
|
assert "${newNormaloHashedPassword}" in machine.succeed("getent shadow new-normalo"), "new-normalo user password is not correct"
|
||||||
|
|
||||||
|
with subtest("new-group group is created after switching to new generation"):
|
||||||
|
print(machine.succeed("getent group new-group"))
|
||||||
|
'';
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user